DYNAMIC RECONFIGURATION OF LOGICAL TOPOLOGIES IN WDM-BASED MESH NETWORKS

Similar documents
Network Topology Control and Routing under Interface Constraints by Link Evaluation

OPTICAL NETWORKS. Virtual Topology Design. A. Gençata İTÜ, Dept. Computer Engineering 2005

Distributed Traffic Adaptive Wavelength Routing in IP-Over- WDM networks

A Modified Heuristic Approach of Logical Topology Design in WDM Optical Networks

Distributed Clustering Method for Large-Scaled Wavelength Routed Networks

I R TECHNICAL RESEARCH REPORT. A Local Optimization Algorithm for Logical Topology Design and Traffic Grooming in IP over WDM Networks

Distributed Clustering Method for Large-Scaled Wavelength Routed Networks

An Efficient Algorithm for Solving Traffic Grooming Problems in Optical Networks

EXAMINING OF RECONFIGURATION AND REROUTING APPROACHES: WDM NETWORKS

Master s Thesis. Title. Supervisor Professor Masayuki Murata. Author Yuki Koizumi. February 15th, 2006

Efficient Segmentation based heuristic approach for Virtual Topology Design in Fiber Optical Networks

Wavelength Assignment in a Ring Topology for Wavelength Routed WDM Optical Networks

Recover-Forwarding Method in Link Failure with Pre-established Recovery Table for Wide Area Ethernet

A Novel Class-based Protection Algorithm Providing Fast Service Recovery in IP/WDM Networks

A New Algorithm for the Distributed RWA Problem in WDM Networks Using Ant Colony Optimization

Toward the joint design of electronic and optical layer protection

Analysis and Algorithms for Partial Protection in Mesh Networks

An Ant Colony Optimization Implementation for Dynamic Routing and Wavelength Assignment in Optical Networks

Sparse Converter Placement in WDM Networks and their Dynamic Operation Using Path-Metric Based Algorithms

Prioritized Shufflenet Routing in TOAD based 2X2 OTDM Router.

A Heuristic Algorithm for Designing Logical Topologies in Packet Networks with Wavelength Routing

Delayed reservation decision in optical burst switching networks with optical buffers

Design Methodologies and Algorithms for Survivable C-RAN

WAVELENGTH-DIVISION multiplexing (WDM) is a

Maximization of Single Hop Traffic with Greedy Heuristics

Master s Thesis. Logical Topology Design and Multi-layered Survivability. for IP over WDM Networks

Rollout Algorithms for Logical Topology Design and Traffic Grooming in Multihop WDM Networks

Internet Traffic Characteristics. How to take care of the Bursty IP traffic in Optical Networks

Unavoidable Constraints and Collision Avoidance Techniques in Performance Evaluation of Asynchronous Transmission WDMA Protocols

Optical networking technology

A Path Decomposition Approach for Computing Blocking Probabilities in Wavelength-Routing Networks

Adaptive Weight Functions for Shortest Path Routing Algorithms for Multi-Wavelength Optical WDM Networks

Low-Energy-Consumption Ad Hoc Mesh Network Based on Intermittent Receiver-driven Transmission

Preserving Survivability During Logical Topology Reconfiguration in WDM Ring Networks

ADAPTIVE LINK WEIGHT ASSIGNMENT AND RANDOM EARLY BLOCKING ALGORITHM FOR DYNAMIC ROUTING IN WDM NETWORKS

Dynamic Wavelength Assignment for WDM All-Optical Tree Networks

An Efficient Algorithm for Virtual-Wavelength-Path Routing Minimizing Average Number of Hops

Fault-Tolerant Design of Wavelength-Routed Optical. Networks. S. Ramamurthy and Biswanath Mukherjee

Optical Communications and Networking 朱祖勍. Nov. 27, 2017

A Novel Genetic Approach to Provide Differentiated Levels of Service Resilience in IP-MPLS/WDM Networks

n = 2 n = 2 n = 1 n = 1 λ 12 µ λ λ /2 λ /2 λ22 λ 22 λ 22 λ n = 0 n = 0 λ 11 λ /2 0,2,0,0 1,1,1, ,0,2,0 1,0,1,0 0,2,0,0 12 1,1,0,0

Simple Layout Algorithms To Maintain Network Connectivity Under Faults

A Novel Optimization Method of Optical Network Planning. Wu CHEN 1, a

Hierarchical Traffic Grooming Formulations

Efficient path protection using Bi-directional WDM transmission technology. Title

Design of Hierarchical Crossconnect WDM Networks Employing a Two-Stage Multiplexing Scheme of Waveband and Wavelength

Expected Capacity Guaranteed Routing based on Dynamic Link Failure Prediction

On Efficient Protection Design for Dynamic Multipath Provisioning in Elastic Optical Networks

Dynamic Routing and Resource Allocation in WDM Transport Networks

A Novel High Performance Multicast Scheme on Virtual Ring-Based 2D Torus Topology in DWDM Networks

RWA on Scheduled Lightpath Demands in WDM Optical Transport Networks with Time Disjoint Paths

Performance analysis of realistic optical time division multiplexed wavelength routed networks. Creative Commons: Attribution 3.0 Hong Kong License

Proposal of Stackable ROADM for Wavelength Transparent IP-over-CWDM Networks

Fault Tolerant System for Sparse Traffic Grooming in Optical WDM Mesh Networks Using Combiner Queue

A Review of Traffic Management in WDM Optical Networks: Progress and Challenges

A Distributed Clustering Method for Hierarchical Routing in Large-Scaled Wavelength Routed Networks

Multiconfiguration Multihop Protocols: A New Class of Protocols for Packet-Switched WDM Optical Networks

DYNAMIC ROUTING WITH PARTIAL INFORMATION IN MESH-RESTORABLE OPTICAL NETWORKS *

DIVERSION: A Trade-Off Between Link and Path Protection Strategies

A New Architecture for Multihop Optical Networks

Node Placement Optimization Techniques in Multihop Lightwave Based de Bruijn Graph Network

Survivability Aware Routing of Logical Topologies: On Thiran-Kurant Approach, Enhancements and Evaluation

UNIT- 2 Physical Layer and Overview of PL Switching

PAPER Two-Way Release Message Transmission and Its Wavelength Selection Rules for Preemption in OBS Networks

Outline. EL736 Communications Networks II: Design and Algorithms. Class3: Network Design Modelling Yong Liu 09/19/2006

Splitter Placement in All-Optical WDM Networks

Comparison of Protection Cost at IP or WDM Layer

Performance of Optical Burst Switching Techniques in Multi-Hop Networks

On the Stability of Virtual Network Topology Control for Overlay Routing Services

A NEW TRAFFIC AGGREGATION SCHEME IN ALL-OPTICAL WAVELENGTH ROUTED NETWORKS

Available online at ScienceDirect

Improving Channel Scanning Procedures for WLAN Handoffs 1

Reducing the Size of Routing Tables for Large-scale Network Simulation

Arc Perturbation Algorithms for Optical Network Design

Resource Sharing for QoS in Agile All Photonic Networks

Application-Aware Protection in DWDM Optical Networks

Wavelength-Routed Optical Networks: Linear Formulation, Resource Budgeting Tradeoffs, and a Reconfiguration Study

An Algorithm for Traffic Grooming in WDM Mesh Networks with Dynamically Changing Light-Trees

An Integer Programming Approach to Packing Lightpaths on WDM Networks 파장분할다중화망의광경로패킹에대한정수계획해법. 1. Introduction

Design of Large-Scale Optical Networks Λ

Research on Control Routing Technology in Communication Network

Performance Analysis on Various Wavelength Assignment Algorithms with Traffic Grooming

Modification of an energy-efficient virtual network mapping method for a load-dependent power consumption model

Cost-based Pricing for Multicast Streaming Services

A Biological Approach to Physical Topology Design for Plasticity in Optical Networks

Cost-Effective Traffic Grooming in WDM Rings

Link Selection Algorithms for Link-Based ILPs and Applications to RWA in Mesh Networks

Designing VNT Candidates Robust Against Network Failures

Automatic Service and Protection Path Computation - A Multiplexing Approach

Performance of Multihop Communications Using Logical Topologies on Optical Torus Networks

Simulation of All Optical Networks

THE EXPLOSIVE growth of Web-related services over the. A Practical Approach to Operating Survivable WDM Networks

SPARE CAPACITY MODELLING AND ITS APPLICATIONS IN SURVIVABLE IP-OVER-OPTICAL NETWORKS

ROUTING AND WAVELENGTH ASSIGNMENT FOR SCHEDULED AND RANDOM LIGHTPATH DEMANDS: BIFURCATED ROUTING VERSUS NON-BIFURCATED ROUTING

A Customizable Two-Step Framework for General Equipment Provisioning in Optical Transport Networks

A Hybrid Multicast Scheduling Algorithm for Single-Hop WDM Networks

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 21, NO. 7, SEPTEMBER

Threshold-Based Policy for LSP and Lightpath Setup in GMPLS Networks

TRAFFIC GROOMING WITH BLOCKING PROBABILITY REDUCTION IN DYNAMIC OPTICAL WDM NETWORKS

Survivable Virtual Topology Routing under Shared Risk Link Groups in WDM Networks

Transcription:

DYNAMIC RECONFIGURATION OF LOGICAL TOPOLOGIES IN WDM-BASED MESH NETWORKS Shinya Ishida Graduate School of Information Science and Technology, Osaka University Machikaneyama 1-32, Toyonaka, Osaka, 0-0043 Japan s-isida@ist.osaka-u.ac.jp Shin ichi Arakawa Graduate School of Economics, Osaka University Machikaneyama 1-7, Toyonaka, Osaka, 0-0043 Japan arakawa@econ.osaka-u.ac.jp Masayuki Murata Cybermedia Center, Osaka University Machikaneyama 1-32, Toyonaka, Osaka, 0-0043 Japan murata@cmc.osaka-u.ac.jp Abstract A Wavelength Division Multiplexing (WDM) network offers a flexible networking infrastructure by assigning the route and wavelength of lightpaths. We can construct an optimal logical topology, by properly setting up the lightpaths. Furthermore, setting up a backup lightpath for each lightpath improves network reliability. When traffic demand changes, a new optimal (or sub-optimal) topology should be obtained by again applying the formulation. Then, we can reconfigure the running topology to the logical topology obtained. However, during this reconfiguration, traffic loss may occur due to the deletion of older lightpaths. In this paper, we consider reconfiguring the logical topology in reliable WDM-based mesh networks, and we propose five procedures that can be used to reconfigure a running lightpath to a new one. Applying the procedures one by one produces a new logical topology. The procedures mainly focus on utilizing free wavelength resources and the resources of backup lightpaths, which are not used usually for transporting traffic. The results of computer simulations indicate that the traffic loss is remarkably reduced in the 14-node network we used as an example. Keywords: WDM, lightpath, logical topology, reconfiguration, reliability

2 1. Introduction Recently, the rapid growth of Internet traffic has led to demands for extra capacity in the backbone networks. WDM (Wavelength Division Multiplexing) technology, which allows multiple wavelengths to be carried on a single fiber, is expected to handle those demands with lower costs. Furthermore, recent advances in optical devices, such as optical switches, have led to WDM technology with networking capabilities. Suppose that each node has an optical switch directly connecting each input wavelength to an output wavelength, so that there is no electronic processing at the packet level. That is, no electronic routing is needed at the nodes. This means wavelength path can be set up directly between two nodes via one or more optical switches. Logical topologies are constructed as a sets of lightpaths, each of which is configured by properly assigning a wavelength and determining a route. In Refs. [1], [2], methods to design logical topologies are investigated. In many past studies on designing logical topology, it has commonly been assumed that traffic demand is known in advance, except [3 4]. However, in practice, it is difficult to predict changes in traffic demand due to factors like the start of new services in networks, such as streaming media services and contents delivery services. Required lightpaths should be increased immediately once the WDM network performance becomes inadequate. Therefore, flexible network design is a more important method than static network design []. As the transmission capacities of WDM networks increase, traffic losses when failures occur in the networks is unacceptable. Protection methods are considered to improve the reliability of WDM networks, in which each lightpath has wavelength resources reserved for backup purpose []. In this method, a primary and its backup lightpath are assigned for each traffic demand. Primary lightpath is used in usual data transmission. Backup lightpath is used when the primary lightpath is unavailable due to a network failure. An advantage of protection method is to avoid computing a route and a wavelength of a backup lightpath after the failure occurs, and thus fast recovery can be achieved. However, the total capacity that a WDM network accommodate is also limited, since the wavelength resources of backup lightpaths are not used for traffic transportation. To avoid the waste of wavelength resources for backup lightpaths, shared protection strategy is proposed [7]. Using this strategy, several backup lightpaths can share wavelength resources if and only if any of the backup lightpaths are not utilized simultaneously. In Ref. [7], incremental capacity dimensioning is proposed. It is a network design method to achieve flexibility and reliability in WDM

Dynamic Reconfiguration of Logical Topologies in WDM-based Mesh Networks3 mesh networks. In this method, logical topology design is first applied for a given traffic demand. With the incremental traffic demand, a one-by-one assignment of the primary lightpath as well as the backup lightpaths based on the user s perception of performance is done. The one-by-one assignment may result in a topology far from the optimal one. Therefore, we reconfigure the running topology to the optimal (or suboptimal) logical topology obtained by again applying the design method for the current traffic demand. During reconfiguration between two logical topologies, packet loss or delayed arrival may occur due to the deletion of older lightpaths. It may result in a loss of traffic on those lightpaths and decline of the performance of a network. Therefore, there is a trade-off in the reconfiguration between improved network performance obtained from the reconfiguration itself, and the traffic loss penalty due to the deletion of the lightpath during the reconfiguration [8]. There have been various studies on reconfiguration methods to minimize lightpath deletion [8 12]. In Ref. [11], a branch-exchange method is proposed to relieve the influence of tearing down working lightpaths. It tries to minimize traffic loss by reducing the number of steps required in a reconfiguration. Reconfigurations in ring networks are also considered in Ref. [12]. However, most of studies on the reconfiguration have been proposals for star-based WDM networks with optical passive star couplers or ring-based WDM networks. In this paper, on the other hand, we propose a reconfiguration algorithm for WDM-based mesh networks to provide flexible and reliable backbones. Our basic idea for the reconfiguration is to use wavelength resources reserved for backup lightpaths which are not always utilized. Our algorithm is based on five procedures to set up and tear down lightpaths. In addition to simply setting up or tearing down lightpaths, we have considered three other procedures to incorporate wavelength resources for backup lightpaths. Since the backup lightpaths are not always used for transporting the actual traffic, we exploit their wavelength resources assuming that failure does not occur during reconfiguration. We evaluated the performance of the algorithm with 14-node network. The evaluation results show that the algorithm can dramatically reduce the incidence of traffic loss during reconfigurations against random changes of traffic patterns. In certain situations, we achieved reconfigurations without traffic loss. This paper is organized as follows. In Section 2, we introduce five procedures to reconfigure local topologies. In Section 3, we present a heuristic reconfiguration algorithm. We evaluate the algorithm in Subsection 4.1 with random traffic models. We also evaluate the performance of the algorithm with taking traffic transition and the rate of

4 utilized resources into account in Subsection 4.2. We conclude our paper in Section. 2. Procedures to reconfigure logical topologies In this section, we introduce five procedures to reconfigure logical topologies: SWITCH, APPEND, BACKUP, RELEASE, DELETE. Here, we define working lightpath as a lightpath on a current working logical topology on which data traffic is actually transported. We also define as a new lightpath organizing a part of the new logical topology obtained by a certain logical topology design algorithm. In followings, the shared protection method is assumed, but these procedures are easily applied for the dedicated protection. 2.1 Notations First, let us explain the symbols used in our algorithm. N: Number of nodes in a network. Each node is assigned a number from 1 to N, respectively. W : L 1 : L 2 : Degree of wavelength multiplexing. Each wavelength is assigned an index number from 1 to W, respectively. Set of working lightpaths included in a current logical topology. Set of s included in a target logical topology. b(l): Backup lightpath of a lightpath l. s(l): Source node of a lightpath l. d(l): Destination node of a lightpath l. λ(l): Wavelength allocated to a lightpath l. 1 λ(l) W. 2.2 SWITCH procedure Traffic loss is one of the fatal problem during the reconfiguration of logical topologies. A reconfiguration of a logical topology has to be implemented rapidly and smoothly even though there may be significant traffic flow through the logical topology. If a working lightpath is deleted carelessly, the traffic on it is of course lost and the network performance gets worsen. However, SWITCH procedure can reduce such traffic loss remarkably by switching traffic on a current lightpath l 1 to a target lightpath l 2. These two lightpaths have the same source and destination nodes. The SWITCH procedure is as follows:

Dynamic Reconfiguration of Logical Topologies in WDM-based Mesh Networks backup lightpath backup lightpath 1 2 3 4 1 2 3 4 working lightpath 7 8 working lightpath 7 8 (a) Step 1: Reserve wavelength resources for a. Set the target light- (b) Step 2: path. backup lightpath backup lightpath 1 2 3 4 1 2 3 4 working lightpath 7 8 working lightpath 7 8 (c) Step 3: Switch traffic from the working lightpath to the target. (d) Step 4: Receive the last packet on the working lightpath. 4 1 2 3 4 7 (e) Step : Delete the working and backup lightpaths. Figure 1. Each step of SWITCH procedure Step 1: Reserve wavelength resources for a l 2, where s(l 1 ) = s(l 2 )andd(l 1 ) = d(l 2 ) are identical, i.e., the source and destination nodes of the working lightpath are identical to the source and destination node of a. If the resource reservation is succeeded, go to Step 2. Otherwise quit this procedure. Step 2: Set the l 2.GotoStep3. Step 3: Switch the traffic on the working lightpath l 1 to the target l 2. Go to Step 4. Step 4: If the last packet on the working lightpath reaches the destination node d(l 1 ), go to Step. Step : Delete the working lightpath l 1 and its backup lightpath b(l 1 ). Figure 1 details the SWITCH procedure. If a portion of the wavelength resources utilized in a working lightpath are required to set up a

, the working lightpath is to be deleted. Here, we search a which has the same source and destination node as the working lightpath. The traffic on the working lightpath is switched to the before the former is deleted. Thus, no traffic loss occurs. This procedure progresses the reconfiguration effectively because a is set up and a working lightpath is released without traffic loss. Hereafter, we describe SWITCH(l 1,l 2 ) as the SWITCH procedure call for a working lightpath l 1 and a l 2. 2.3 APPEND procedure SWITCH procedure has a harder constraint that a working and target lightpath must have the same source and destination nodes to apply the procedure between these two lightpaths. If there is a which cannot be set with the SWITCH procedure, the is to be set with following APPEND procedure. This procedure simply set the. We note that the SWITCH procedure is more efficient than the APPEND procedure because the former releases the wavelength resources reserved for a working and its backup lightpath without traffic loss. APPEND(l 2 ) works as follows to create a target lightpath l 2. Step 1: Reserve wavelength resources for a l 2. If the reservation is succeeded, go to Step 2. Otherwise, quit this procedure. Step 2: Set the l 2. 2.4 BACKUP procedure If a portion of the wavelength resources for a working lightpath is required by one or more s, and if there is no target lightpaths whose source and destination nodes are identical to those of the working lightpath, the working lightpath will be discarded without its traffic being protected. This usually results in traffic loss, but in a reliable WDM network with backup lightpaths, it is possible to avoid this by utilizing the backup lightpath prepared for the working lightpath (BACKUP procedure). The BACKUP procedure is as follows: Step 1: Reserve wavelength resources for the backup lightpath b(l 1 )ofa working primary lightpath l 1.GotoStep2. Step 2: Set the backup lightpath b(l 1 ). Go to Step 3. Step 3: Switch the traffic on the working lightpath l 1 to its backup b(l 1 ). Go to Step 4.

Dynamic Reconfiguration of Logical Topologies in WDM-based Mesh Networks7 working lightpath backup lightpath working lightpath backup lightpath 1 4 2 3 1 4 2 3 7 8 7 8 (a) Step 1: Reserve wavelength resources for backup lightpath. (b) Step 2: lightpath. Setup the backup working lightpath backup lightpath working lightpath backup lightpath 1 4 2 3 1 4 2 3 7 8 7 8 (c) Step 3: Switch traffic to the backup lightpath. (d) Step 4: Receive the last packet on the working lightpath. backup lightpath 1 4 2 3 7 8 (e) Step : Delete the working lightpath. Figure 2. Each step of BACKUP procedure Step 4: If the last packet on the working lightpath reaches the destination node d(l 1 ), go to Step. Step : Delete the working lightpath l 1. Figure 2 illustrates the BACKUP procedure. Here, the working and its backup lightpath are prepared from nodes 1 to 4. Suppose that the working lightpath is not necessary in the target logical topology and that there is not a pair for the SWITCH procedure. In this situation, the working lightpath will be finally deleted. However, if the backup lightpath of the working lightpath is available, i.e., if all the wavelength resources of the backup lightpath are not shared with other backup lightpaths and are not required to set up s, the traffic running through the working lightpath can be switched onto the backup lightpath. The backup lightpath is left until the reconfig-

8 uration of all the target primary lightpaths will finished. We describe BACKUP(l 1 ) as the procedure call to switch the traffic on a lightpath l 1 to its backup lightpath b(l 1 ). 2. RELEASE procedure Suppose that there is a working lightpath whose resources are required to set up s and that it cannot be applied SWITCH, APPEND, or BACKUP procedure. In this case, traffic of the working lightpath tends to be lost by deleting it. However, with the RELEASE procedure, we can avoid the unnecessary deletion of working lightpaths. The RELEASE procedure releases the wavelength resources of the backup lightpath for a working lightpath. After that, the reconfiguration continues to make progress using the SWITCH or APPEND procedure with the released wavelength resources. RELEASE(l 1 ) is the procedure call to release the wavelength resources of a backup lightpath b(l 1 ); Step 1: Release wavelength resources reserved for a backup lightpath. 2. DELETE procedure The DELETE procedure deletes a working lightpath without protecting its traffic. The traffic on the deleted lightpath is lost. Note that the DELETE procedure is the only procedure that results in a traffic loss. The working lightpath should be applied the RELEASE procedure before applying the DELETE procedure. DELETE(l 1 ) is the procedure call to tear down a lightpathl 1 ; Step 1: Release wavelength resources reserved for a working lightpath. 2.7 Wavelength re-allocation Reconfigurations of logical topologies can be achieved using those five procedures. However, there is plenty of room for improvement in making the reconfigurations more efficient. Wavelength re-allocation provides one means. It re-allocates a new wavelength to a, if another wavelength resources on the same route of the are available. This extension is applied to SWITCH, APPEND, or BACKUP procedures. Suppose that the reserved wavelength resources on a wavelength (say λ 1 ) are required to set up a. Wavelength re-allocation assigns another available wavelength (assume λ i as i 1) to the, which solves the conflict on λ 1. After that, the SWITCH or APPEND procedure set up the that uses the new λ i wavelength resources.

Dynamic Reconfiguration of Logical Topologies in WDM-based Mesh Networks9 This re-allocation is done when a portion of the wavelength resources of the are reserved for working or backup lightpaths, and when there are free wavelength resources that are not required to set up other s. When we use the wavelength re-allocation, Step 1 of SWITCH procedure is revised as follows: Step 1.1: Reserve wavelength resources for a l 2,where s(l 1 )=s(l 2 )andd(l 1 )=d(l 2 ). If the resource reservation is succeeded, go to Step 2. Otherwise go to Step 1.2. Step 1.2: For each wavelength w (1 w W, w λ(l 2 )), try Step 1.3. If all trials fail, quit this procedure. Step 1.3: Check the resources of wavelength w along the route of the target path. If the resources are not reserved and not required to set up any other lightpaths, go to Step 1.4. Otherwise go back to Step 1.2. Step 1.4: Re-allocate w to the and reserve the re-allocated resources.gotostep2. Here, we search free wavelength by the First-Fit policy in this reallocation. The network performance of the re-allocated lightpath is identical to the original because the routes of both lightpaths seen from the upper layer are the same. Therefore, this wavelength re-allocation does not have any bad effect on the reconfigurations of logical topologies. 3. Reconfiguration algorithm To relieve the unbalance of the traffic load on WDM mesh networks, we need reconfigurations of logical topologies. In this section, we propose a reconfiguration algorithm of logical topologies in WDM mesh networks. This algorithm is composed of five procedures described above. Since only the DELETE procedure leads to traffic loss, we heuristically suppress the number of DELETE procedure calls during a reconfiguration. It requires two logical topologies: a current logical topology and a target logical topology to be reconfigured. Therefore, the increase or decrease of traffic volume during the reconfiguration is not considered here. We use a variable P in our reconfiguration algorithm to store the number of SWITCH, APPEND, BACKUP procedure calls in each iteration. We also define C as a set of working lightpaths which are candidates for a pair of a to execute SWITCH procedure. In this paper, we assume that no network failures occur during reconfiguration, because reconfiguration is invoked once per, say, one week or month. The reconfiguration algorithm we propose is as follows:

10 Step 1: For each l 2 L 2, if there is a working lightpath l 1 L 1 which has the same route and wavelength as l 2, delete the elements from L 1 and L 2. P 0. C φ. GotoStep2. Step 2: For each l 2, try following steps. After that, go to Step 3. Step 2.1: Add working lightpaths l 1 L 1 into C which fulfills these conditions: s(l 1 )=s(l 2 ), d(l 1 )=d(l 2 )andl 1 does not reserve wavelength resources required for l 2. If C φ, gotostep2.2.otherwise,gotostep2.3. Step 2.2: Among the elements in C, select a working lightpath l 1 whose wavelength resources of both primary and backup lightpaths are most utilized to set up target lightpaths in L 2. Execute SWITCH(l 1,l 2). Delete l 1 and l 2 from L 1 and L 2, respectively. P P +1. C φ. GobacktoStep2. Step 2.3: Execute APPEND(l 2 ). Delete l 2 from L 2. P P +1. Go to Step 2. Step 3: If L 2 = φ, gotostep.otherwise,gotostep4. Step 4: For each working lightpath l 1 L 1, execute BACKUP(l 1 ) and, if it succeeds, delete l 1 form L 1 and P P +1.GotoStep. Step : If P>0, P 0 and go back to Step 2. Otherwise, go to Step.1. Step.1: If there are working lightpaths whose backup lightpaths are not released, go to Step.2. Otherwise, go to Step.3. Step.2: Select a working lightpath l 1 where the wavelength resources of backup lightpath (b(l 1 )) are most utilized to set up s in L 2. Execute RELEASE(l 1 ). P 0. Go back to Step 2. Step.3: Select a working lightpath l 1 whose wavelength resources of primary lightpath are most utilized to set up target lightpaths in L 2. Execute DELETE(l 1 ). Delete l 1 form L 1. P 0. Go back to Step 2. Step : Delete all of the remaining working lightpaths in L 1 and those backup lightpaths. Go to Step 7. Step 7: Restore the re-allocated wavelengths of s to the original wavelengths. Go to Step 8.

Dynamic Reconfiguration of Logical Topologies in WDM-based Mesh Networks11 Step 8: Reserve the wavelength resources of the backup lightpaths for the s. In Step 1, we detect working lightpaths which are also included in L 2. These working lightpaths are left as s. From Steps 2 through, we set all the s. Backup lightpaths for each are set in Step 8. This is based on the assumption that no network failures occur during a reconfiguration. In Step 2, we check whether the wavelength resources to set target lightpaths are available or not. We give priority to the SWITCH procedure over the APPEND procedure because of the differences in their efficiency (see Sec. 2.3). Hence, we try to apply the SWITCH procedure in setting up the at first (Step 2.2). In Step 2.2, a working lightpath, l 1, is chosen as a pair of a, l 2,fromthe set of the candidates. To make the SWITCH procedure more efficient, we select the pair heuristically as follows. The wavelength resources released by the SWITCH procedure can be utilized for setting up remaining. We therefore choose a working lightpath as a pair of a, such that the working lightpath holds the most amount of wavelength resources required to set up other remaining s. Other strategies are to select lightpaths in descending (ascending) order of the number of hop-counts. We call these strategies longest-first-strategy (shortest-first-strategy). As the reconfiguration continues by the SWITCH or APPEND procedure, s reserve their wavelength resources. And available wavelength resources are decreased. Ultimately, no s can be set because the available wavelength resources are exhausted. In Step 3, if all s in L 2 have already been created, we can go to Step. Otherwise, in Step 4, we try to find free wavelength resources to utilize set up other remaining s by applying BACKUP procedures. If one or more trial succeeds, we obtain new available wavelength resources without traffic loss. Then we go back to Step 2 and try to set up the rest of the s in L 2. In Step, all s are created and traffic in a network is accommodated by these s. Hence, we can delete the old working lightpaths in L 1. If there are lightpaths whose wavelengths are re-allocated by wavelength re-allocation, we tune the re-allocated wavelength to the original one in Step 7. In Step 8, reserve the wavelength resources for the backup lightpaths of the s and finish the reconfiguration. In this paper, we assume that one by one operations of reconfiguration procedures. However, two operations may be executed at the same time

12 Figure 3. NSFNET (14 nodes and 21 links) as long as the corresponding lightpaths are independent of the operations. Doing this results in shorter time to complete the reconfiguration, but it is out of the scope of this paper. The operations of these reconfigurations are controlled in both centralized or distributed systems. 4. Evaluation Our algorithm selects a working lightpath heuristically when the lightpath is required to delete in a SWITCH or DELETE procedure. We evaluated the effectiveness of the heuristic selection at first. 4.1 Performance of the reconfiguration algorithm We evaluated our reconfiguration algorithm with a wide area network model and various degrees of wavelengths. 4.1.1 Evaluation model. Here, we explain our evaluation model. We used the NSFNET, which has 14 nodes and 21 links, as a network model. This network topology is shown in Figure 3. We generated series of traffic matrices T 1,T 2,,T k, where the elements of each traffic matrix are set a random value between zero and the transmission capacity of a fiber. We evaluated the performance of our algorithm with logical topologies where the patterns are changed randomly since this is the most difficult case to reconfigure logical topologies without traffic loss. We examined the performance of our algorithm in the worst case. In this paper, we set k =. We simulated reconfigurations when the degree of wavelength multiplexing is 1, 32, 4, 128, or 2. 4.1.2 Logical topology design algorithm. To generate the logical topologies for those traffic matrices, we used a simple design algorithm (SDA). SDA works as follows. Given a traffic matrix, SDK select a node pair which has a largest traffic demand in the traffic matrix.

Dynamic Reconfiguration of Logical Topologies in WDM-based Mesh Networks13 Table 1. Properties of logical topologies to be reconfigured. The second row shows the average number of lightpaths excluding backup lightpaths in a logical topology. Number of wavelengths 1 32 4 128 2 Number of primary lightpaths 210 404 779 127 3082 Then, SDA sets up a primary lightpath and a backup one between the nodes, and reduces the transmission capacity of a lightpath from the traffic demand (in this paper, we set the transmission capacity of a lightpath as 10 Gbps). Each of primary and backup lightpath is selected on the shortest route, in terms of the propagation delay, among currently available routes. Backup lightpaths are selected on a disjoint sets of links of corresponding working lightpaths. And SDA also deals with shared protection strategy. For each lightpath, its wavelength is assigned based on First-Fit policy. If SDA fails to set up a primary and a backup lightpaths for the traffic demand from a source node to a destination node, SDA sets the traffic demand zero. The properties of the logical topologies obtained by SDA are shown in Table 1. The average utilization of wavelength resources on links is 9%. We do not consider the traffic demands which are not accommodated by the logical topology design algorithm because only the loss of traffic during reconfiguration is our concern. 4.1.3 Effectiveness of heuristic selection strategy. We examined the effectiveness of those three strategies by the number of times of DELETE procedure calls (i.e., the number of traffic loss occurrences) in a reconfiguration. The results are shown in Figure 4 where the average numbers of DELETE procedure calls are dependent on the degree of wavelength multiplexing. This figure shows traffic loss of the algorithm with heuristic strategy is more than twice as little as those of the algorithms with longest/shortest-strategy. The heuristic strategy is effective and thus we will obtain the further results by adopting the heuristic strategy. 4.1.4 Effectiveness of procedures. Next, we consider four algorithms for comparison: Algorithms 1, 2, 3, and 4. Algorithm 4 is our proposed algorithm, and the first three algorithms are subsets of Algorithm 4. They are compared in Table 2. We also examined the performances of those four algorithms by the number of times of DELETE procedure calls in a reconfiguration (i.e., the number of traffic loss occurrences). From Figure, traffic loss decreases in order from Algorithm 1 to 2 to 3 to 4, and there is a relatively large gap between Algorithms 2 and 3. This result shows that wavelength re-allocation is useful in reconfigurations of logical topolo-

14 Number of traffic loss occurences 100 1400 1200 1000 800 00 400 200 heuristic longest first shortest first 0 0 0 100 10 200 20 300 Degree of Wavelength Multiplexing Figure 4. Number of traffic loss occurrences during a reconfiguration of a logical topology in the NSFNET. Table 2. Comparison of four algorithms. Algorithm 1 is a basic algorithm composed of SWITCH, RELEASE, APPEND, and DELETE procedures. Algorithm 2 allows BACKUP procedure moreover, whereas Algorithm 3 allows wavelength re-allocation. Algorithm 4 is the proposed algorithm, which employs all procedures and wavelength re-allocation. Algorithm 1 2 3 4 SWITCH Enabled Enabled Enabled Enabled APPEND Enabled Enabled Enabled Enabled BACKUP Enabled Enabled RELEASE Enabled Enabled Enabled Enabled DELETE Enabled Enabled Enabled Enabled re-allocation Enabled Enabled Number of traffic loss incidents 1200 1000 800 00 400 200 Algorithm 1 Algorithm 2 Algorithm 3 Algorithm 4 0 0 0 100 10 200 20 300 Degree of wavelength multiplexing Figure. Number of traffic loss occurrences during a reconfiguration of a logical topology in the NSFNET. gies. On the other hand, BACKUP procedure is still less effective than wavelength re-allocation. We believe that the shared protection strategy makes BACKUP procedure less effective.

Dynamic Reconfiguration of Logical Topologies in WDM-based Mesh Networks1 4.2 Effectiveness of reconfiguring logical topologies We had another evaluation to examine the effectiveness of reconfiguring logical topologies. In this subsection, we observed the performance of our reconfiguration algorithm when the dynamic changing of traffic model is applied and the changing of the average utilization of wavelength resources on links. 4.2.1 Traffic transition model. We have generated a series of traffic matrices T 1,T 2,,T k, where those elements are random number between zero and the transmission capacity of a fiber. Here, we use another traffic model similar to the model described in Ref. [12]. Eq. (1) shows the traffic model. T 1,T 2,,T k are the same traffic matrices used in the above simulation. The parameter h gives h-step traffic transitions between T i and T i+1. [ T k,l = round (1 h l )T k + h l T k+1] (1) 4.2.2 Consideration of effective reconfiguration. We use NSFNET (shown in Figure 3) as a network model to show the effect of parameter h. The degree of wavelength multiplexing is 128 or 2. We set k = and h = 1, 4, 8. Logical topologies are generated by applying SDA to traffic matrices T m,l (1 m k, 0 l h). We examined the performances of two algorithms, Algorithms 3 and 4, by changing the average utilization of wavelength resources from 30% to 9% by a step of 2%. We realize the target utilization of wavelength resources in logical topologies by inserting the check process of wavelength usage in SDA. The results are shown in Figs. and 7. The vertical axis shows the average number of traffic loss occurrences and the cross axis is the average of total bit rate carried in the whole network, where the bit rate is obtained by the number of primary lightpaths times the transmission capacity of the lightpath. According to Figs. (a) and 7(a), the number of lightpaths Algorithm 4 can reconfigure without traffic loss is about one and a half times as much as the number of lightpaths Algorithm 3 can do. However, when h gets larger, i.e., when logical topologies change gradually, the difference of the performance between Algorithms 3 and 4 becomes smaller. In the figures, when h = 8, the results of Algorithms 3 and 4 are almost same. It indicates that BACKUP procedure is much less efficient when the utilization of wavelength resources is high and when the change of logical topologies are small.

1 Number of traffic loss occurences 30 300 20 200 10 100 0 Algorithm 3 Algorithm 4 0 0 2000 4000 000 8000 10000 12000 14000 1000 Total bit rate (Gbps) Number of traffic loss occurences 30 300 20 200 10 100 0 Algorithm 3 Algorithm 4 0 0 2000 4000 000 8000 10000 12000 14000 1000 Total bit rate (Gbps) Number of traffic loss occurences 100 80 0 40 20 Algorithm 3 Algorithm 4 (a) h =1 0 0 2000 4000 000 8000 10000 12000 14000 1000 Total bit rate (Gbps) Number of traffic loss occurences 100 80 0 40 20 Algorithm 3 Algorithm 4 (b) h =2 0 0 2000 4000 000 8000 10000 12000 14000 1000 Total bit rate (Gbps) (c) h =4 (d) h =8 Figure. Relation between the performance of reconfiguration algorithms and the bit rate of the whole of logical topology when the degree of wavelength resources is 128. Table 3. Number of each procedure calls in a reconfiguration with Algorithm 4 when the rate of use of wavelength resources is 9% in NSFNET waves h SWITCH APPEND BACKUP RELEASE DELETE total 128 1 373 913 110 973 243 212 128 8 932 14 11 131 1 2212 2 1 727 1839 22 191 49 499 2 8 18 329 22 282 1 4449 To explain the differences which result from changing values of h, we compare the number of procedure calls in Table 3. From Table 3, as the value of h becomes larger, the number of the SWITCH procedure calls also becomes larger, whereas the number of the APPEND procedure calls decreases. The SWITCH procedure protects traffic on working lightpaths, and thus the number of traffic loss occurrences becomes to a few or zero. We illustrate this situation in Figure 8. When h is 1, each element of traffic matrices is changed randomly. Therefore, there may be many wavelength resource conflicts between working

Dynamic Reconfiguration of Logical Topologies in WDM-based Mesh Networks17 Number of traffic loss occurences 700 00 00 400 300 200 100 Algorithm 3 Algorithm 4 0 0 000 10000 1000 20000 2000 30000 Total bit rate (Gbps) Number of traffic loss occurences 700 00 00 400 300 200 100 Algorithm 3 Algorithm 4 0 0 000 10000 1000 20000 2000 30000 Total bit rate (Gbps) Number of traffic loss occurences 100 80 0 40 20 Algorithm 3 Algorithm 4 (a) h =1 0 0 000 10000 1000 20000 2000 30000 Total bit rate (Gbps) Number of traffic loss occurences 100 80 0 40 20 Algorithm 3 Algorithm 4 (b) h =2 0 0 000 10000 1000 20000 2000 30000 Total bit rate (Gbps) (c) h =4 (d) h =8 Figure 7. Relation between the performance of reconfiguration algorithms and the bit rate carried in the whole of logical topology when the degree of wavelength resources is 2. lightpaths and s. Suppose that two working lightpaths P 1 and P 2 require a certain wavelength on the links 2-3 and 3-4, respectively, and a, P 3, requires the same wavelength on the link 2-4. In this case, APPEND(P 3 ) is tried at first. Then, BACKUP(P 1 )andbackup(p 2 ) are next tried. If these trials do not succeed, RELEASE(P 1 )andrelease(p 2 ) are executed. Finally, DELETE(P 1 )anddelete(p 2 ) are executed. Thus, the numbers of APPEND, BACKUP, RELEASE and DELETE procedure calls become larger. On the other hand, if h is large, a gradual change on the traffic matrices results in the requesting almost the same number of lightpaths between node pairs. In Figure 8(b), the working lightpath P 2 and the P 4 are assigned the same route and wavelength. Therefore, P 2 is remained as the P 4, and need not be reconfigured. Or the route of the P 3 may be selected on the different route from that used by the working lightpath P 1. In this case, SWITCH(P 1,P 3 ) is executed. Therefore, the number of SWITCH procedure calls gets larger and other procedure calls decrease.

18 working lightpath working lightpath P1 P2 1 2 3 4 P3 P1 P2 1 2 3 4 P3 P4 (a) Typical case when h =1 (b) Typical case when h>1 Figure 8. Illustrative Examples of the effect of parameter h. The working lightpaths are to be disrupted and the s are set up in a reconfiguration, We go back to Figs. and 7. The results show that changing to the very different logical topology, which may be an optimal logical topology, will be tolerable against the moderate utilization of wavelength resources. However, for the higher utilization of wavelength resources, the gradual changes on the traffic matrices greatly reduce the traffic loss during the reconfiguration. Although Algorithm 4 reduces the number of DELETE procedure calls compared to Algorithm 3, we need a logical topology design algorithm which generate sub-optimal topology with less changes on lightpaths, rather than the optimal one. To investigate such a design algorithm is beyond the scope of this paper and constitutes the scope of future work.. Summary In this paper, we proposed an algorithm to reconfigure logical topologies in reliable WDM mesh networks. The algorithm is composed of five procedures to set up or tear down lightpaths. We first evaluated the performance of the algorithm with randomly generated traffic, and then evaluated with changes of network load using a dynamic traffic model. The result have shown that changing to the very different logical topology will be tolerable for the moderate utilization of wavelength resources. We also found that the gradual changes on the traffic demand greatly reduce the traffic loss during the reconfiguration. The objective of our current and future work is to investigate the logical topology design algorithm which generates sub-optimal topology with less changes on lightpaths. Acknowledgments This work was supported in part by the Telecommunications Advancement Organization of Japan (TAO), and by a Grant-in-Aid for Scientific Research (A) 14208027 from the Ministry of Education, Culture, Sports, Science and Technology of Japan.

References [1] R. Ramaswami and K. N. Sivarajan, Design of logical topologies for wavelength-routed optical networks, IEEE Journal on Selected Areas in Communications, vol. 14, pp. 840 81, June 199. [2] R. Dutta and G. N. Rouskas, A survey of virtual topology design algorithms for wavelength routed optical networks, Optical Network Magazine, vol. 1, pp. 73 89, January 2000. [3] A. Gençata and B. Mukherjee, Virtual-topology adaptation for WDM mesh netoworks under dynamic traffic, in Proceedings of IEEE INFOCOM, 2002. [4] D. Banerjee and B. Mukherjee, Wavelength-routed optical networks: Linear formulation, resource budgeting tradeoffs, and a reconfiguration study, IEEE/ACM Transactions on Networking, vol. 8, pp. 98 07, October 2000. [] M. Murata, Challenges for the next generation Internet and the role of IP over photonic networks, IEICE Transactions on Communications, vol. E83-B, pp. 213 21, October 2000. [] S. Ramamurthy and B. Mukherjee, Survivable WDM mesh networks, in Proceedings of IEEE INFOCOMM 99, pp. 744 71, March 1999. [7] S. Arakawa and M. Murata, On incremental capacity dimensioning for reliable IP over WDM networks, in Proceedings of Opticomm, pp. 13 12, August 2001. [8] I. Baldine and G. N. Rouskas, Dynamic reconfiguration policies in multihop WDM networks, Journal of High Speed Networks, vol. 4, no. 3, pp. 221 238, 199. [9] J.-F. P. Labourdette and A. S. Acampora, Logically rearrangeable multihop lightwave networks, IEEE Transactions on Communications, vol. 39, pp. 1223 1230, August 1991. [10] I. Baldine and G. N. Rouskas, Dynamic load balancing in broadcast WDM networks with tuning latencies, in Proceedings of IEEE INFOCOM 98, pp. 78 8, March 1998. [11] J.-F. P. Labourdette, G. W. Hart, and A. S. Acampora, Branch-exchange sequences for reconfiguration of lightwave networks, IEEE Transactions on Communications, vol. 42, pp. 2822 2832, October 1994.

20 [12] A. Narula-Tam and E. Modiano, Dynamic load balancing in WDM packet networks with and without wavelength constraints, IEEE Journal on Selected Areas in Communications, vol. 18, pp. 1972 1979, October 2000.